Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(163)

Issue 2344002: Add recovery mode protection to new NVRAM locking scheme. (Closed)

Created:
10 years, 7 months ago by Luigi Semenzato
Modified:
9 years, 7 months ago
Reviewers:
gauravsh
CC:
chromium-os-reviews_chromium.org, gauravsh
Base URL:
ssh://git@chromiumos-git/chromeos
Visibility:
Public.

Description

Add recovery mode protection to new NVRAM locking scheme. Also fix the TPM initialization.

Patch Set 1 #

Patch Set 2 : do not set bGlobalLock following TPM errors. #

Total comments: 4

Patch Set 3 : removed TODO and 0x00FFFF->0xFFFF #

Patch Set 4 : typo in comment #

Unified diffs Side-by-side diffs Delta from patch set Stats (+190 lines, -116 lines) Patch
M src/platform/vboot_reference/tests/rollback_index_mock.c View 1 chunk +13 lines, -22 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/include/rollback_index.h View 1 chunk +10 lines, -10 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/lib/firmware_image_fw.c View 1 2 3 chunks +6 lines, -6 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/lib/include/tss_constants.h View 1 chunk +2 lines, -0 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/lib/kernel_image_fw.c View 3 chunks +6 lines, -6 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/lib/rollback_index.c View 1 2 3 3 chunks +149 lines, -70 lines 0 comments Download
M src/platform/vboot_reference/vboot_firmware/linktest/main.c View 2 chunks +4 lines, -2 lines 0 comments Download

Messages

Total messages: 5 (0 generated)
Luigi Semenzato
Hi Gaurav, good morning. I added more thorough TPM first-time initialization and also the kernel ...
10 years, 7 months ago (2010-05-28 00:50:54 UTC) #1
gauravsh
LGTM. Thanks! As for making sure this won't cause another buildbot failure - try building ...
10 years, 7 months ago (2010-05-28 07:57:52 UTC) #2
Luigi Semenzato
Hi---I removed the TODO and I explained why, or at least I tried. Since you've ...
10 years, 7 months ago (2010-05-28 16:35:15 UTC) #3
Luigi Semenzato
By the way, I tested it with ./build_autotest.sh --build=firmware_VbootCrypto as you suggested. On Fri, May ...
10 years, 7 months ago (2010-05-28 16:40:04 UTC) #4
gauravsh
10 years, 7 months ago (2010-05-28 18:39:43 UTC) #5
Cool, thanks Luigi!

On Fri, May 28, 2010 at 9:39 AM, Luigi Semenzato <semenzato@chromium.org> wrote:
> By the way, I tested it with ./build_autotest.sh
> --build=firmware_VbootCrypto as you suggested.
>
>
> On Fri, May 28, 2010 at 9:35 AM,  <semenzato@chromium.org> wrote:
>> Hi---I removed the TODO and I explained why, or at least I tried.  Since
>> you've
>> already LGTM'd it, I'll push it shortly.  Thanks!
>>
>>
>> http://codereview.chromium.org/2344002/diff/3001/4003
>> File src/platform/vboot_reference/vboot_firmware/lib/firmware_image_fw.c
>> (right):
>>
>> http://codereview.chromium.org/2344002/diff/3001/4003#newcode285
>> src/platform/vboot_reference/vboot_firmware/lib/firmware_image_fw.c:285:
>> (uint16_t) (min_lversion >> 16),
>> On 2010/05/28 07:57:52, gauravsh wrote:
>>>
>>> nit: weird extra space :)
>>
>> :) he he.  Just in case, the extra space is there because Version ->
>> Versions.
>>
>> http://codereview.chromium.org/2344002/diff/3001/4006
>> File src/platform/vboot_reference/vboot_firmware/lib/rollback_index.c
>> (right):
>>
>> http://codereview.chromium.org/2344002/diff/3001/4006#newcode62
>> src/platform/vboot_reference/vboot_firmware/lib/rollback_index.c:62: *
>> locking this space earlier or later.
>> On 2010/05/28 07:57:52, gauravsh wrote:
>>>
>>> can you elaborate on this TODO? Unclear to me what the issue is.
>>
>> This space is only used to distinguish an error situation from an
>> uninitialized TPM.  It is created after all other spaces have been
>> created and initialized.  So, if some NVRAM operations fail, and this
>> space does not exist, the RO firmware will try to initialize the TPM.
>> If it exists, it will go right into recovery mode.  Now: if we lock this
>> space early, it can never be removed---not even in recovery mode, with
>> PP on.  I think it's OK because we don't really care to re-execute
>> InitializeSpaces in the RO firmware ever again.  If we really need to,
>> we can do it at user level in recovery mode.  So I am going to remove
>> the TODO---it's done.
>>
>> http://codereview.chromium.org/2344002/show
>>
>



-- 
-g

Powered by Google App Engine
This is Rietveld 408576698